Vulnerabilities > CVE-2003-1109 - Unspecified vulnerability in Cisco products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
cisco
nessus

Summary

The Session Initiation Protocol (SIP) implementation in multiple Cisco products including IP Phone models 7940 and 7960, IOS versions in the 12.2 train, and Secure PIX 5.2.9 to 6.2.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted INVITE messages, as demonstrated by the OUSPG PROTOS c07-sip test suite.

Vulnerable Configurations

Part Description Count
OS
Cisco
73
Hardware
Cisco
2

Nessus

  • NASL familyCISCO
    NASL idCISCO-SA-20030221-PROTOSHTTP.NASL
    description Multiple Cisco products contain vulnerabilities in the processing of Session Initiation Protocol (SIP) INVITE messages. These vulnerabilities were identified by the University of Oulu Secure Programming Group (OUSPG)
    last seen2019-10-28
    modified2010-09-01
    plugin id48969
    published2010-09-01
    reporterThis script is (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/48969
    titleMultiple Product Vulnerabilities Found by PROTOS SIP Test Suite - Cisco Systems
  • NASL familyCISCO
    NASL idCSCDZ39284.NASL
    descriptionIt is possible to make the remote IOS crash when sending it malformed SIP packets. These vulnerabilities are documented as CISCO bug id CSCdz39284 and CSCdz41124.
    last seen2020-06-01
    modified2020-06-02
    plugin id11380
    published2003-03-14
    reporterThis script is (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11380
    titleCisco SIP Crafted INVITE Message Handling DoS (CSCdz39284, CSCdz41124)